diff options
author | jbeich <jbeich@FreeBSD.org> | 2017-03-18 17:40:21 +0800 |
---|---|---|
committer | Koop Mast <kwm@rainbow-runner.nl> | 2017-04-09 20:01:57 +0800 |
commit | 77342f69d51663a88058e4efe3535364dadf0dfe (patch) | |
tree | 03ae8f97d0f5635c4fc9e9e7f70442d907bea821 /security | |
parent | 916834f089bd6a7a5637ee11c378a2d4543a1994 (diff) | |
download | freebsd-ports-gnome-77342f69d51663a88058e4efe3535364dadf0dfe.tar.gz freebsd-ports-gnome-77342f69d51663a88058e4efe3535364dadf0dfe.tar.zst freebsd-ports-gnome-77342f69d51663a88058e4efe3535364dadf0dfe.zip |
security/vuxml: mark firefox < 52.0.1 as vulnerable
Note, sandboxing isn't implemented on FreeBSD.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2292e8a4ad8e..b37393e9c8fe 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5f453b69-abab-4e76-b6e5-2ed0bafcaee3"> + <topic>firefox -- integer overflow in createImageBitmap()</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>52.0.1,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2017-08/"> + <p>An integer overflow in createImageBitmap() was reported + through the Pwn2Own contest. The fix for this vulnerability + disables the experimental extensions to the + createImageBitmap API. This function runs in the content + sandbox, requiring a second vulnerability to compromise a + user's computer.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-5428</cvename> + <url>https://www.mozilla.org/security/advisories/mfsa2017-08/</url> + </references> + <dates> + <discovery>2017-03-17</discovery> + <entry>2017-03-18</entry> + </dates> + </vuln> + <vuln vid="df45b4bd-0b7f-11e7-970f-002590263bf5"> <topic>moodle -- multiple vulnerabilities</topic> <affects> |